>> Hawking was the only one to stay the course...and yes, he did get a laptop.
Oh really? Given that he was born in 1942, and would have left high-school at 16, or 18 (assuming he went to a Grammar school), he would have left school in 1960.
Now I know laptops have been around for a while, and unless you're a theoretical physicist who understands time, time travel, and
Customers, potential customers, and to stick it to IBM.
The OS is just a vehicle for a database.
1) Change your name via Deed-Poll to the letters left in your rack.
2) Place letters on board
3) ???
4) Profit!
solaris console login: ^H
Grrrr.
Yeah - same problem - of about nine or ten systems that I've tried it on (up to snv_133), all of them have at least one hardware problem.
eg from my memory
NIC drivers (Broadcom, Even Intel)
W/LAN drivers (Atheros for instance)
Display driver support (not just VESA!)
HW RAID drivers (Compaq, Promise)
AHCI drivers (including NCQ and hot plug support (slated to fix in snv 135)
AMD PhenomII support (fixed now since snv 126)
and I've had issues with the install (eg installation from USB CDROM)
However, saying all this, the journey is worthwhile - some features really are fantastic - especially together:
ZFS + snapshots + dedupe + Virtualbox VMs.
YMMV
random my ass!
only appears to be random if you have javascript working (thanks noscript!) - Otherwise IE8 appears first on the list, on the left.
I know MS has been advertising Windows 7 a lot, but to sponsor a near miss with a 7m asteroid - that takes some doing.
For a good read, I can recommend "The Hut Six Story : Breaking the Enigma Codes by Gordon Welchman".
Some of the reasons why Enigma Failed:
1) Choosing "sillies" for encryption keys (eg QWE, QAZ (or whatever the equivalent is on the German AZERTY keyboard).
2) Re-using keys
3) Using Cribs (eg putting some of the preamble of the message into the encrypted part)
4) Sending the same message day after day (eg "Nothing to Report"). This would compromise the key for all stations using that key:
5) Using the same key for lots of destination stations
6) Fundamental design limitation (A Letter will never encrypt to itself).
7) Enigma operator laziness (eg using the same order of wheels as the previous day). (There are 5*4*3 = 60 combinations possible).
8) More laziness - using the default Ring setting on each ring.
9) "Indicator setting" repeated - in 1 in 8 cases this would lead to a repeated encrypted key - which would give the cryptanalyst an idea of which wheels could have been used. (Fundamentally this is a kind of key distribution problem - how to get the session key established).
10) Basing a military encryption system on a commercial product.
Sixty years on, we're still making some of the same mistakes!
I'm wondering - Microsoft is now embedding its vitualisation technology into the desktop (they've already done it for Windows Server of course).
Is this the next salvo in the Microsoft vs. EveryOneElse? I'm thinking what happened in the Browser wars. NCSA/Mosaic initially was a superior browser to IE. Now is the same thing going to start happening to VMware/VirtualBox/ParallelsDesktop? It's hard to compete with Free (VirtualBox is free of course for personal users).
I'm also wondering if this is a sort of admission that Windows7 won't offer a fully compatible API for legacy applications to carry on working?
Crispi
Other than being a domain typo, www.ninmsn.com just redirects to a web index.
Are we going to include all domain squatting / domain misspellings / misregistrations now as well?
What about google cache of a banned URL?
It seems clear that the URL filter won't be capable of doing RegEx expansion.
This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian